U.S. flag   An unofficial archive of your favorite United States government website
Dot gov

Official websites do not use .rip
We are an unofficial archive, replace .rip by .gov in the URL to access the official website. Access our document index here.

Https

We are building a provable archive!
A lock (Dot gov) or https:// don't prove our archive is authentic, only that you securely accessed it. Note that we are working to fix that :)

Search CSRC

Use this form to search content on CSRC pages.

For a phrase search, use " "


Limit results to content tagged with of the following topics:
Showing 1276 through 1300 of 13539 matching records.
Publications Book Section December 12, 2018
https://csrc.nist.rip/publications/detail/book/2018/comprehensive-security-assurance-measures-for-virtualized-server-environments

In: From Database to Cyber Security Abstract: Virtualization is the dominant technology employed in enterprise data centers and those used for offering cloud computing services. This technology has resulted in what is called a virtualized infrastructure.

Publications Conference Proceedings December 10, 2018
https://csrc.nist.rip/publications/detail/conference-paper/2018/12/10/test-generation-framework-for-debugging-big-data-apps

Conference: 2018 IEEE International Conference on Big Data (Big Data) Abstract: When a failure occurs in a big data application, debugging with the original dataset can be difficult due to the large amount of data being processed. This paper introduces a framework for effectively generating method-level tests to facilitate debugging of big data applications. This is achieved by...

Publications NISTIR 8011 Vol. 3 December 6, 2018
https://csrc.nist.rip/publications/detail/nistir/8011/vol-3/final

Abstract: The NISTIR 8011 volumes each focus on an individual information security capability, adding tangible detail to the more general overview given in NISTIR 8011 Volume 1, and providing a template for transition to a detailed, NIST guidance-based automated assessment. This document, Volume 3 of NISTIR 8...

Publications Journal Article December 1, 2018
https://csrc.nist.rip/publications/detail/journal-article/2018/the-trouble-with-terms

Journal: IT Professional Abstract: Thousands of new words have been invented in the past decade to help us talk about technology. An analysis of the NIST computer security glossary database shows insights into how we invent and define these words and the impact of those definitions.

Publications Journal Article December 1, 2018
https://csrc.nist.rip/publications/detail/journal-article/2018/toward-cyberresiliency-in-cloud-computing

Journal: IEEE Security & Privacy Abstract: Cyberresiliency is the capability of an enterprise network to continuously provide (the supported missions and business processes with) essential functions in the midst of an attack campaign. It is defined as "the ability to anticipate, withstand, recover from, and adapt to adverse conditions, stres...

Publications NISTIR 8200 November 29, 2018
https://csrc.nist.rip/publications/detail/nistir/8200/final

Abstract: The Interagency International Cybersecurity Standardization Working Group (IICS WG) was established in December 2015 by the National Security Council’s Cyber Interagency Policy Committee. Its purpose is to coordinate on major issues in international cybersecurity standardization and thereby enhance...

Publications Conference Proceedings November 26, 2018
https://csrc.nist.rip/publications/detail/conference-paper/2018/11/26/the-new-randomness-beacon-format-standard

Conference: 4th International Conference on Research in Security Standardisation (SSR 2018) Abstract: We discuss the development of a new format for beacons—servers which provide a sequence of digitally signed and hash-chained public random numbers on a fixed schedule. Users of beacons rely on the trustworthiness of the beacon operators. We consider several possible attacks on the users by the beaco...

Publications Journal Article November 1, 2018
https://csrc.nist.rip/publications/detail/journal-article/2018/access-control-for-emerging-distributed-systems

Journal: Computer (IEEE Computer) Abstract: As big data, cloud computing, grid computing, and the Internet of Things reshape current data systems and practices, IT experts are keen to harness the power of distributed systems to boost security and prevent fraud. How can these systems’ capabilities be used to improve processing without inflatin...

Publications Journal Article October 29, 2018
https://csrc.nist.rip/publications/detail/journal-article/2018/complexity-and-verification-of-quantum-random-circuit-sampling

Journal: Nature Physics Abstract: A critical milestone on the path to useful quantum computers is the demonstration of a quantum computation that is prohibitively hard for classical computers—a task referred to as quantum supremacy. A leading near-term candidate is sampling from the probability distributions of randomly chosen quant...

Publications ITL Bulletin October 25, 2018
https://csrc.nist.rip/publications/detail/itl-bulletin/2018/10/helping-to-build-blockchain-knowledge/final

Abstract: This bulletin summarizes the information found in NISTIR 8202: Blockchain Technology overview which provides a high-level technical overview of blockchain technology. It discusses its application to cryptocurrency in depth, but also shows its broader applications.

Publications White Paper (Draft) October 17, 2018
https://csrc.nist.rip/publications/detail/white-paper/2018/10/17/iot-trust-concerns/draft

Abstract: The Internet of Things (IoT) refers to systems that involve computation, sensing, communication, and actuation (as presented in NIST Special Publication (SP) 800-183). IoT involves the connection between humans, non-human physical objects, and cyber objects, enabling monitoring, automation, and deci...

Publications NISTIR 8202 October 3, 2018
https://csrc.nist.rip/publications/detail/nistir/8202/final

Abstract: Blockchains are tamper evident and tamper resistant digital ledgers implemented in a distributed fashion (i.e., without a central repository) and usually without a central authority (i.e., a bank, company, or government). At their basic level, they enable a community of users to record transactions...

Publications ITL Bulletin September 20, 2018
https://csrc.nist.rip/publications/detail/itl-bulletin/2018/09/automated-cryptographic-validation-testing/final

Abstract: This bulletin summarizes the NIST Automated Cryptographic Validation (ACV) Testing project. NIST selects and standardizes cryptographic algorithms as NIST-approved for use within the U.S. Federal Government. The Computer Security Division specifies the relative strength of various cryptographic algo...

Publications White Paper NIST CSWP 7 September 10, 2018
https://csrc.nist.rip/publications/detail/white-paper/2018/09/10/transitioning-to-scap-version-2/final

Abstract: The Security Content Automation Protocol (SCAP) version 2 (v2) automates endpoint posture information collection and the incorporation of that information into network defense capabilities using standardized protocols. SCAP v2 expands the endpoint types supported by SCAP v1 through the explicit incl...

Publications White Paper September 7, 2018
https://csrc.nist.rip/publications/detail/white-paper/2018/09/07/economic-impacts-of-the-advanced-encryption-standard-1996-2017/final

Abstract: Each year, the Federal Government spends more than $140 billion on research and development (R&D). Approximately $40 billion is used to support intramural research and Federally funded R&D centers, a relatively small portion of which goes to the National Institutes of Standards and Technolog...

Publications SP 1800-5 September 7, 2018
https://csrc.nist.rip/publications/detail/sp/1800-5/final

Abstract: While a physical asset management system can tell you the location of a computer, it cannot answer questions like, “What operating systems are our laptops running?” and “Which devices are vulnerable to the latest threat?” An effective IT asset management (ITAM) solution can tie together physical and...

Publications Journal Article September 1, 2018
https://csrc.nist.rip/publications/detail/journal-article/2018/finding-bugs-in-cryptographic-hash-function-implementations

Journal: IEEE Transactions on Reliability Abstract: Cryptographic hash functions are security-critical algorithms with many practical applications, notably in digital signatures. Developing an approach to test them can be particularly difficult, and bugs can remain unnoticed for many years. We revisit the National Institute of Standards and Technolog...

Publications Journal Article September 1, 2018
https://csrc.nist.rip/publications/detail/journal-article/2018/improved-upper-bounds-for-the-expected-circuit-complexity

Journal: Information Processing Letters Abstract: Minimizing the Boolean circuit implementation of a given cryptographic function is an important issue. A number of papers only consider cancellation-free straight-line programs for producing small circuits over GF(2). Cancellation is allowed by the Boyar–Peralta (BP) heuristic. This yields a valuabl...

Publications SP 1800-8 August 17, 2018
https://csrc.nist.rip/publications/detail/sp/1800-8/final

Abstract: Medical devices, such as infusion pumps, were once standalone instruments that interacted only with the patient or medical provider. However, today’s medical devices connect to a variety of healthcare systems, networks, and other tools within a healthcare delivery organization (HDO). Connecting devi...

Publications Conference Proceedings August 12, 2018
https://csrc.nist.rip/publications/detail/conference-paper/2018/08/12/security-mindsets-in-organizations-that-develop-crypto-products

Conference: Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018) Abstract: Cryptography is an essential component of modern computing. Unfortunately, implementing cryptography correctly is a non-trivial undertaking. Past studies have supported this observation by revealing a multitude of errors and developer pitfalls in the cryptographic implementations of software product...

Publications Conference Proceedings August 1, 2018
https://csrc.nist.rip/publications/detail/conference-paper/2018/08/01/quantifying-information-exposure-in-internet-routing

Conference: 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications (TrustCom) Abstract: Data sent over the Internet can be monitored and manipulated by intermediate entities in the data path from the source to the destination. For unencrypted communications (and some encrypted communications with known weaknesses), eavesdropping and man-in-the-middle attacks are possible. For encrypted...

Publications Conference Proceedings August 1, 2018
https://csrc.nist.rip/publications/detail/conference-paper/2018/08/01/managed-blockchain-based-cryptocurrencies

Conference: The 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) Abstract: Blockchain based cryptocurrencies are usually unmanaged, distributed, consensus-based systems in which no single entity has control. Managed cryptocurrencies can be implemented using private blockchains but are fundamentally different as the owners have complete control to do arbitrary activity with...

Publications Journal Article July 31, 2018
https://csrc.nist.rip/publications/detail/journal-article/2018/cybertrust-in-the-iot-age

Journal: Computer (IEEE Computer) Abstract: Will our smart devices betray us? Can we trust our smart beds, pet feeders, and watches to maintain the level of privacy we want and expect? As the numbers of devices coming online reach staggering levels, serious questions must be raised about the level of cybertrust we can reasonably expect to hav...

Publications SP 1800-1 July 27, 2018
https://csrc.nist.rip/publications/detail/sp/1800-1/final

Abstract: Healthcare providers increasingly use mobile devices to receive, store, process, and transmit patient clinical information. According to our own risk analysis, discussed here, and in the experience of many healthcare providers, mobile devices can introduce vulnerabilities in a healthcare organizatio...

Publications ITL Bulletin July 26, 2018
https://csrc.nist.rip/publications/detail/itl-bulletin/2018/07/controlled-unclassified-information-security-requirements/final

Abstract: This bulletin summarizes the information found in NIST SP 800-171A: Assessing Security Requirements for Controlled Unclassified Information (CUI) which provides federal and nonfederal organizations with assessment procedures and a methodology that can be employed to conduct assessments of the CUI se...

<< first   < previous   40     41     42     43     44     45     46     47     48     49     50     51     52     53     54     55     56     57     58     59     60     61     62     63     64  next >  last >>